CVE-2025-11365: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in akbrohi WP Google Map Plugin
The WP Google Map Plugin plugin for WordPress is vulnerable to blind SQL Injection via the 'id' parameter of the 'google_map' shortcode in all versions up to, and including, 1.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
AI Analysis
Technical Summary
CVE-2025-11365 identifies a blind SQL Injection vulnerability in the WP Google Map Plugin for WordPress, specifically in the 'id' parameter of the 'google_map' shortcode. The vulnerability arises from improper neutralization of special elements in SQL commands (CWE-89), where user-supplied input is insufficiently escaped and the SQL queries are not properly prepared or parameterized. This flaw enables authenticated attackers with Contributor-level access or higher to append arbitrary SQL queries to existing ones, potentially extracting sensitive data from the backend database. The attack vector is network-based and does not require user interaction, but it does require authentication with at least Contributor privileges, which are commonly granted to users who can submit content but not publish it. The CVSS 3.1 score of 6.5 reflects a medium severity, driven by high confidentiality impact, no impact on integrity or availability, low attack complexity, and the requirement for privileges. No patches or public exploits are currently available, increasing the urgency for proactive mitigation. The vulnerability affects all versions up to and including 1.0 of the plugin, which is widely used in WordPress installations for embedding Google Maps. The lack of input sanitization and parameterized queries is a common cause of SQL Injection vulnerabilities, making this a critical coding flaw that can be exploited to leak sensitive information such as user data, credentials, or site configuration details stored in the database.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of data stored in WordPress databases. Organizations using the WP Google Map Plugin on their websites could have sensitive customer information, internal data, or credentials exposed if attackers exploit this flaw. Since the attack requires Contributor-level access, insider threats or compromised contributor accounts could be leveraged to extract data stealthily. The impact is heightened for sectors handling personal data under GDPR, as data breaches could lead to regulatory penalties and reputational damage. Although the vulnerability does not affect data integrity or site availability directly, the unauthorized disclosure of sensitive information can facilitate further attacks or data misuse. Organizations relying on WordPress for public-facing or internal portals should consider this a moderate threat that could escalate if combined with other vulnerabilities or social engineering attacks. The absence of known exploits in the wild provides a window for remediation, but the ease of exploitation and network accessibility mean that attacks could emerge rapidly once details become public.
Mitigation Recommendations
To mitigate CVE-2025-11365, European organizations should first verify if they use the WP Google Map Plugin version 1.0 or earlier and plan immediate updates once a patch is released. In the absence of an official patch, temporarily disabling the plugin or removing the 'google_map' shortcode usage can reduce exposure. Restrict Contributor-level access strictly to trusted users and audit existing Contributor accounts for suspicious activity. Implement Web Application Firewall (WAF) rules to detect and block SQL Injection patterns targeting the 'id' parameter of the shortcode. Employ database query monitoring to identify anomalous or unexpected SQL commands. Encourage developers or site administrators to apply input validation and parameterized queries in custom code or plugin forks. Regularly back up WordPress databases and monitor logs for signs of exploitation attempts. Additionally, enforce strong authentication and multi-factor authentication for all WordPress accounts with elevated privileges to reduce the risk of account compromise.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-11365: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in akbrohi WP Google Map Plugin
Description
The WP Google Map Plugin plugin for WordPress is vulnerable to blind SQL Injection via the 'id' parameter of the 'google_map' shortcode in all versions up to, and including, 1.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
AI-Powered Analysis
Technical Analysis
CVE-2025-11365 identifies a blind SQL Injection vulnerability in the WP Google Map Plugin for WordPress, specifically in the 'id' parameter of the 'google_map' shortcode. The vulnerability arises from improper neutralization of special elements in SQL commands (CWE-89), where user-supplied input is insufficiently escaped and the SQL queries are not properly prepared or parameterized. This flaw enables authenticated attackers with Contributor-level access or higher to append arbitrary SQL queries to existing ones, potentially extracting sensitive data from the backend database. The attack vector is network-based and does not require user interaction, but it does require authentication with at least Contributor privileges, which are commonly granted to users who can submit content but not publish it. The CVSS 3.1 score of 6.5 reflects a medium severity, driven by high confidentiality impact, no impact on integrity or availability, low attack complexity, and the requirement for privileges. No patches or public exploits are currently available, increasing the urgency for proactive mitigation. The vulnerability affects all versions up to and including 1.0 of the plugin, which is widely used in WordPress installations for embedding Google Maps. The lack of input sanitization and parameterized queries is a common cause of SQL Injection vulnerabilities, making this a critical coding flaw that can be exploited to leak sensitive information such as user data, credentials, or site configuration details stored in the database.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of data stored in WordPress databases. Organizations using the WP Google Map Plugin on their websites could have sensitive customer information, internal data, or credentials exposed if attackers exploit this flaw. Since the attack requires Contributor-level access, insider threats or compromised contributor accounts could be leveraged to extract data stealthily. The impact is heightened for sectors handling personal data under GDPR, as data breaches could lead to regulatory penalties and reputational damage. Although the vulnerability does not affect data integrity or site availability directly, the unauthorized disclosure of sensitive information can facilitate further attacks or data misuse. Organizations relying on WordPress for public-facing or internal portals should consider this a moderate threat that could escalate if combined with other vulnerabilities or social engineering attacks. The absence of known exploits in the wild provides a window for remediation, but the ease of exploitation and network accessibility mean that attacks could emerge rapidly once details become public.
Mitigation Recommendations
To mitigate CVE-2025-11365, European organizations should first verify if they use the WP Google Map Plugin version 1.0 or earlier and plan immediate updates once a patch is released. In the absence of an official patch, temporarily disabling the plugin or removing the 'google_map' shortcode usage can reduce exposure. Restrict Contributor-level access strictly to trusted users and audit existing Contributor accounts for suspicious activity. Implement Web Application Firewall (WAF) rules to detect and block SQL Injection patterns targeting the 'id' parameter of the shortcode. Employ database query monitoring to identify anomalous or unexpected SQL commands. Encourage developers or site administrators to apply input validation and parameterized queries in custom code or plugin forks. Regularly back up WordPress databases and monitor logs for signs of exploitation attempts. Additionally, enforce strong authentication and multi-factor authentication for all WordPress accounts with elevated privileges to reduce the risk of account compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-06T13:02:14.253Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ef5c7ec4f69c9730e56a05
Added to database: 10/15/2025, 8:34:06 AM
Last enriched: 10/15/2025, 8:52:07 AM
Last updated: 10/15/2025, 2:20:58 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-56746: n/a
UnknownCVE-2025-61974: CWE-401: Missing Release of Memory after Effective Lifetime in F5 BIG-IP
HighCVE-2025-61960: CWE-476 NULL Pointer Dereference in F5 BIG-IP
HighCVE-2025-61958: CWE-250: Execution with Unnecessary Privileges in F5 BIG-IP
HighCVE-2025-61955: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code in F5 F5OS - Appliance
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.